In order to protect yourself from hackers, you must think as one.
This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.
The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.
Below are the main topics, both theoretical and practical, of this course:
- Core problems (Causes. Defences)
- Web Technologies (HTTP Protocol, Web Functionality, Encoding)
- Mapping (Spidering and Analysing)
- Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)
- Attacking Session Management (State, Tokens, Flaws)
- Attacking Access Controls (Common Vulnerabilities, Attacks)
- Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)
- Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)
- Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)
- Attacking Application Logic
- Cross Site Scripting
- Attacking Users (CSRF, ClickJacking, HTML Injection)
Demos:
- Spidering, Website Analyser
- Brute-Force
- Session Hijacking via Mann-in-The-Middle
- Get Gmail or Facebook Passwords via SSLStrip
- SQL Injection
- Upload File and Remote Execution
- Cross-Site Scripting (Stored + Reflected, Preventing XSS)
- CSRF (Change password trough CSRF vuln., Preventing CSRF)
Course Curriculum
Why Web Security?
- Introduction (1:14)
- Core Problems – Why Web Security (7:33)
- Web Technologies
- Preparing the Lab Environment (8:31)
Mapping the Web Application. User and Password Brute-Forcing
- What Web Application Mapping Means
- Usernames and Passwords Brute-Forcing using Burp (14:54)
- Spider and Analyze a Website using Burp (5:27)
- Brute-frocing Web Resources using Dirb and Dirbuster (10:38)
Attacking Authentication and Session Management – Session Hijacking
- Theoretical Overview of Attacking Authentication and Session Management
- Session Hijacking trough Man In The Middle Attack (11:05)
- Intercept and access traffic over HTTPS (8:56)
Access controls. Data stores and Client-side Controls
- Theoretical Approach of Attacking Access Controls
- SQL injection (9:09)
- Exploiting SQLi using Sqlmap and Getting Remote Shell (10:07)
- Upload and Remote File Execution (10:43)
Attacking the Server and Application Logic
- Attacking the server: OS Command injection, Path Traversal and Mail Injection
- Attacking Application Logic
(XSS) Cross Site Scripting. Attacking the Users
- Cross Site Scripting Theory. Attacking Users
- Reflected XSS – Session Hijacking using Cross Site Scripting (10:29)
- Stored or Persistent Cross Site Scripting (6:59)
- Cross-site Request Forgery (CSRF) (7:19)
Guideline for Discovering and Improving Application Security
- Guideline for Discovering and Improving Application Security
Get Step by Step Web Applications Penetration Tester – Gabriel Avramescu, Only Price $38
Tag: Step by Step Web Applications Penetration Tester – Gabriel Avramescu Review. Step by Step Web Applications Penetration Tester – Gabriel Avramescu download. Step by Step Web Applications Penetration Tester – Gabriel Avramescu discount.web applications examples
web applications list, web applications for everybody, web applications development, web applications with python.
Reviews
There are no reviews yet.